A survey of emerging threats in cybersecurity

被引:368
|
作者
Jang-Jaccard, Julian [1 ]
Nepal, Surya [1 ]
机构
[1] CSIRO ICT Ctr, Marsfield, NSW, Australia
关键词
Cybersecurity; Malware; Emerging technology trends; Emerging cyber threats; Cyber attacks and countermeasures; SECURITY; INTERNET; SYSTEMS; CHALLENGES; MANAGEMENT; NETWORKS; PRIVACY;
D O I
10.1016/j.jcss.2014.02.005
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The exponential growth of the Internet interconnections has led to a significant growth of cyber attack incidents often with disastrous and grievous consequences. Malware is the primary choice of weapon to carry out malicious intents in the cyberspace, either by exploitation into existing vulnerabilities or utilization of unique characteristics of emerging technologies. The development of more innovative and effective malware defense mechanisms has been regarded as an urgent requirement in the cybersecurity community. To assist in achieving this goal, we first present an overview of the most exploited vulnerabilities in existing hardware, software, and network layers. This is followed by critiques of existing state-of-the-art mitigation techniques as why they do or don't work. We then discuss new attack patterns in emerging technologies such as social media, cloud computing, smartphone technology, and critical infrastructure. Finally, we describe our speculative observations on future research directions. Crown Copyright (c) 2014 Published by Elsevier Inc. All rights reserved.
引用
收藏
页码:973 / 993
页数:21
相关论文
共 50 条
  • [41] Cybersecurity of Industrial Cyber-Physical Systems: A Review
    Kayan, Hakan
    Nunes, Matthew
    Rana, Omer
    Burnap, Pete
    Perera, Charith
    ACM COMPUTING SURVEYS, 2022, 54 (11S)
  • [42] A Comprehensive Survey of Threats in Platooning-A Cloud-Assisted Connected and Autonomous Vehicle Application
    Sheik, Al Tariq
    Maple, Carsten
    Epiphaniou, Gregory
    Dianati, Mehrdad
    INFORMATION, 2024, 15 (01)
  • [43] A Comprehensive Survey of Cybersecurity Threats, Attacks, and Effective Countermeasures in Industrial Internet of Things
    Alnajim, Abdullah M.
    Habib, Shabana
    Islam, Muhammad
    Thwin, Su Myat
    Alotaibi, Faisal
    Mahmoud, Mohammed
    TECHNOLOGIES, 2023, 11 (06)
  • [44] Cybersecurity and Cyber Forensics for Smart Cities: A Comprehensive Literature Review and Survey
    Kim, Kyounggon
    Alshenaifi, Istabraq Mohammed
    Ramachandran, Sundaresan
    Kim, Jisu
    Zia, Tanveer
    Almorjan, Abdulrazaq
    SENSORS, 2023, 23 (07)
  • [45] Drone cybersecurity issues, solutions, trend insights and future perspectives: a survey
    Omolara, Abiodun Esther
    Alawida, Moatsum
    Abiodun, Oludare Isaac
    NEURAL COMPUTING & APPLICATIONS, 2023, 35 (31): : 23063 - 23101
  • [46] Temporal Understanding of Cybersecurity Threats
    Sleeman, Jennifer
    Finin, Tim
    Halem, Milton
    2020 IEEE 6TH INT CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY) / 6TH IEEE INT CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING, (HPSC) / 5TH IEEE INT CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2020, : 115 - 121
  • [47] A primer on insider threats in cybersecurity
    Prabhu, Sunitha
    Thompson, Nik
    INFORMATION SECURITY JOURNAL, 2022, 31 (05): : 602 - 611
  • [48] Cybersecurity threats in the banking sector
    Gulyas, Oliver
    Kiss, Gabor
    2022 8TH INTERNATIONAL CONFERENCE ON CONTROL, DECISION AND INFORMATION TECHNOLOGIES (CODIT'22), 2022, : 1070 - 1075
  • [49] Cyber Threats and Cybersecurity Reassessed in UAV-assisted Cyber Physical Systems
    Haider, Majumder
    Ahmed, Imtiaz
    Rawat, Danda B.
    2022 THIRTEENTH INTERNATIONAL CONFERENCE ON UBIQUITOUS AND FUTURE NETWORKS (ICUFN), 2022, : 222 - 227
  • [50] Cybersecurity of Smart Inverters in the Smart Grid: A Survey
    Li, Yuanliang
    Yan, Jun
    IEEE TRANSACTIONS ON POWER ELECTRONICS, 2023, 38 (02) : 2364 - 2383